5.2 Index of Security Parameters

This protocol does not explicitly control the security parameters that are used to protect the data; however, it does configure the IPsec component, which is a group of security parameter settings.

 Security parameter

 Section

IKE MM Diffie-Hellman groups

ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1)

IKE MM encryption algorithms

ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1)

IKE MM integrity algorithms

ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1)

IKE MM key lifetimes

ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1)

IKE authentication method (PSK, X.509 certificate, Kerberos)

ipsecNFA{GUID} Object Description (section 2.2.1.3.1)

Traffic protection to enact (permit, block, and secure with IPsec)

ipsecNegotiationPolicy Object Attribute Details (section 2.2.1.4)

IPsec QM key lifetimes

ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1)

IPsec framing method (ESP or AH)

ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1)

IPsec encryption algorithms

ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1)

IPsec integrity algorithms

ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1)